Ventajas y riesgos de utilizar Find my iPhone
http://feedproxy.google.com/~r/Seguridadapple/~3/bTgDfsIXP4Y/ventajas-y-riesgos-de-utilizar-find-my.html
http://feedproxy.google.com/~r/Seguridadapple/~3/bTgDfsIXP4Y/ventajas-y-riesgos-de-utilizar-find-my.html
Seguridadapple
Ventajas y riesgos de utilizar Find my iPhone
La funcionalidad “Find my iPhone" o "Find my Mac” es una herramienta que viene de serie en los dispositivos de Apple . Su finalidad es po...
#pestudio 8.66 now available https://t.co/YsPQvsUNrC with "hints" to ease #malware initial assessment. changes.log https://t.co/r1WXpeI0cX https://t.co/2yh5DzA8C9
Twitter
marc ochsenmeier
#pestudio 8.66 now available https://t.co/YsPQvsUNrC with "hints" to ease #malware initial assessment. changes.log https://t.co/r1WXpeI0cX
Remote buffer overflow vulnerability in OpenVPN client https://t.co/3A7RB5yOfd
seclists.org
oss-sec: OpenVPN CVE-2017-12166: remote buffer overflow
Reverse engineering malware: TrickBot (part 1 - packer) https://t.co/u3OCM7Vztr
qmemcpy.github.io
Reverse engineering malware: TrickBot (part 1 - packer)
In this post, I will show how to unpack, dump, and analyze a TrickBot sample. The goal isto show the reader the techniques used by malware analysts and why they are used, includingwrong assumptions...
Nueva versión del troyano OceanLotus para macOS hace saltar las alertas.
https://t.co/UnH7DPjtMh
https://t.co/UnH7DPjtMh
Seguridadapple
Nueva versión del troyano OceanLotus para macOS hace saltar las alertas
El grupo vietnamita OceanLotus ha evolucionado su troyano para Mac creando lo que los investigadores de Palo Alto Networks llaman “uno d...
Las principales vulnerabilidades web
https://t.co/MFU6GIGsH5
https://t.co/MFU6GIGsH5
Hacking Ético
Las principales vulnerabilidades web
Cuando se va a atacar un sistema, lo último que se quiere es que salten todas las alarmas. Es por eso que usar fuentes online son una buena herramienta. Se puede utilizar hacking de buscadores para…
#Vuln: SolarWinds Network Performance Monitor CVE-2017-9538 Denial of Service #Vulnerability
https://t.co/RgyoSLdini #bugtraq
https://t.co/RgyoSLdini #bugtraq
Securityfocus
SolarWinds Network Performance Monitor CVE-2017-9538 Denial of Service Vulnerability
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It…
VNC tunneling over SSH
https://t.co/anNKiqlFKB
https://t.co/anNKiqlFKB
Hacking Articles
VNC tunneling over SSH
In previous article we had perform VNC penetration testing and today you will VNC tunneling to connect remote machine with VNC server when they both belongs different network interface. Basically tunneling is process which allows data sharing or communication…
TeleShadow - Telegram Desktop Session Stealer (Windows) https://t.co/GsRa47D2En #IGram #SessionStealer #Telegram #TeleShadow #Windows
KitPloit - PenTest Tools for your Security Arsenal ☣
TeleShadow - Telegram Desktop Session Stealer (Windows)
Stealing desktop telegrams has never been so easy ! Set the email and sender details of the sender and recipient and send it to the vict...
Equifax Breach Bigger Than Initially Reported
http://feedproxy.google.com/~r/Securityweek/~3/xlQnPJ0rTk8/equifax-breach-bigger-initially-reported
http://feedproxy.google.com/~r/Securityweek/~3/xlQnPJ0rTk8/equifax-breach-bigger-initially-reported
Securityweek
Equifax Breach Bigger Than Initially Reported | SecurityWeek.Com
Equifax said that 2.5 million additional U.S. consumers were exposed as a result of the massive data breach disclosed by the company last month. The credit reporting agency now says that total of 145.5 million individuals have been exposed.
Dnsmasq and the seven flaws: Patch these nasty remote-control holes
http://go.theregister.com/feed/www.theregister.co.uk/2017/10/02/dnsmasq_flaws/
http://go.theregister.com/feed/www.theregister.co.uk/2017/10/02/dnsmasq_flaws/
www.theregister.co.uk
Dnsmasq and the seven flaws: Patch these nasty remote-control holes
Linux, Android, IoT, you name it, they'll need updates if you use this open-source tool
Three WordPress Plugin Zero-Days Exploited in the Wild https://t.co/sOZ7EUP1Rl #WordPress #zeroday #PHP
BleepingComputer
Three WordPress Plugin Zero-Days Exploited in the Wild
Hackers have exploited three zero-days to install backdoors on WordPress sites, according to a security alert published minutes ago by WordPress security firm Wordfence.